1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
10

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembli

ng packets in their original order, and error checking?​
Computers and Technology
1 answer:
andrew11 [14]3 years ago
4 0

Answer:

TCP

Explanation:

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.

You might be interested in
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
3 years ago
(ATRCKALLB) __________is an input device that contains a movable ball on the top.​
nikitadnepr [17]

Answer:

trackball

Explanation:

A trackball can be seen on a mouse.

3 0
2 years ago
Juan wrote a loop to print all the prime numbers between 1 and 100. But instead of stopping at 100, it continues on and on forev
aniked [119]

Answer:

oh im cool

Explanation:

6 0
3 years ago
Make a program that prints each line of its input that mentions fred. (It shouldn’t do anything for other lines of input.) Does
Vitek1552 [10]

Answer:

See Explaination

Explanation:

This assume that input is a file and is given on command line. Please note this will ot print lines with frederick as thats what I feel question is asking for

#!/usr/bin/perl -w

open(FILE, $ARGV[0]) or die("Could not open the file $ARGV[0]");

while ($line = <FILE>){

if($line=~/\s+fred\s+/)

{

print $line;

}

}

close(FILE);

8 0
3 years ago
You are trying to access WiFi network at a coffee shop. What protocol will this type of wireless networking most likely use?
monitta
The answer to your question is a password
3 0
3 years ago
Other questions:
  • Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which
    9·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • print out the last even number from an array of integers, if there is no even number, then print out a sentence indicating so.
    5·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • Would anyone know this
    10·2 answers
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • Only technical managers needs to know about programming, web view source code and about technology issues.
    12·1 answer
  • 2 differences between system and applications software​
    9·2 answers
  • Explain different users of computer in briefly?​
    14·1 answer
  • Assume the name of your data frame is flavors_df. What code chunk lets you review the structure of the data frame?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!